|
From: | Michael Tokarev |
Subject: | Re: [PULL 00/10] Crypto fixes patches |
Date: | Wed, 11 Sep 2024 08:59:33 +0300 |
User-agent: | Mozilla Thunderbird |
On 9/9/24 17:16, Daniel P. Berrangé wrote:
Various crypto fixes * Support sha384 with glib crypto backend * Improve error reporting for unsupported cipher modes * Avoid memory leak when bad cipher mode is given * Run pbkdf tests on macOS * Runtime check for pbkdf hash impls with gnutls & gcrypt * Avoid hangs counter pbkdf iterations on some Linux kernels by using a throwaway thread for benchmarking performance * Fix iotests expected output from gnutls errors
Hm. Are you sure *all* of it should go to qemu-stable? :)
Daniel P. Berrangé (6): iotests: fix expected output from gnutls crypto: check gnutls & gcrypt support the requested pbkdf hash tests/unit: always build the pbkdf crypto unit test tests/unit: build pbkdf test on macOS crypto: avoid leak of ctx when bad cipher mode is given crypto: use consistent error reporting pattern for unsupported cipher modes Dorjoy Chowdhury (3): crypto: Define macros for hash algorithm digest lengths crypto: Support SHA384 hash when using glib crypto: Introduce x509 utils Tiago Pasqualini (1): crypto: run qcrypto_pbkdf2_count_iters in a new thread
Thanks, /mjt
[Prev in Thread] | Current Thread | [Next in Thread] |